Best Practices for responding to "Left Alone" in the virus or threat history log